Book picks similar to
SNMP: A Guide to Network Management by Sidnie M. Feit
computers
network-prot-port
office
Lance Armstrong: Images of a Champion
Lance Armstrong - 2004
His heroic survival from deadly cancer and his hard-fought triumphs in the bicycle race that is thought to be the most grueling endurance test in sports are a tribute to the strength of the human spirit. Filled with never-before-seen pictures--including photos of his historic seventh Tour win--and revealing insights by the people who know him best, this treasured keepsake celebrates in words and photographs Armstrong's indomitable will and champion's heart. See inside Lance's tour with intimate pictures of Armstrong in competition and off the bike, as well as stunning full-color views capturing the grandeur of the sport, by cycling's top photographer, Graham Watson.
Rootkits: Subverting the Windows Kernel
Greg Hoglund - 2005
It is truly cutting-edge. As the only book on the subject,
Rootkits
will be of interest to any Windows security researcher or security programmer. It's detailed, well researched and the technical information is excellent. The level of technical detail, research, and time invested in developing relevant examples is impressive. In one word: Outstanding."--Tony Bautts, Security Consultant; CEO, Xtivix, Inc. "This book is an essential read for anyone responsible for Windows security. Security professionals, Windows system administrators, and programmers in general will want to understand the techniques used by rootkit authors. At a time when many IT and security professionals are still worrying about the latest e-mail virus or how to get all of this month's security patches installed, Mr. Hoglund and Mr. Butler open your eyes to some of the most stealthy and significant threats to the Windows operating system. Only by understanding these offensive techniques can you properly defend the networks and systems for which you are responsible."--Jennifer Kolde, Security Consultant, Author, and Instructor "What's worse than being owned? Not knowing it. Find out what it means to be owned by reading Hoglund and Butler's first-of-a-kind book on rootkits. At the apex the malicious hacker toolset--which includes decompilers, disassemblers, fault-injection engines, kernel debuggers, payload collections, coverage tools, and flow analysis tools--is the rootkit. Beginning where Exploiting Software left off, this book shows how attackers hide in plain sight."Rootkits are extremely powerful and are the next wave of attack technology. Like other types of malicious code, rootkits thrive on stealthiness. They hide away from standard system observers, employing hooks, trampolines, and patches to get their work done. Sophisticated rootkits run in such a way that other programs that usually monitor machine behavior can't easily detect them. A rootkit thus provides insider access only to people who know that it is running and available to accept commands. Kernel rootkits can hide files and running processes to provide a backdoor into the target machine."Understanding the ultimate attacker's tool provides an important motivator for those of us trying to defend systems. No authors are better suited to give you a detailed hands-on understanding of rootkits than Hoglund and Butler. Better to own this book than to be owned."--Gary McGraw, Ph.D., CTO, Cigital, coauthor of Exploiting Software (2004) and Building Secure Software (2002), both from Addison-Wesley "Greg and Jamie are unquestionably the go-to experts when it comes to subverting the Windows API and creating rootkits. These two masters come together to pierce the veil of mystery surrounding rootkits, bringing this information out of the shadows. Anyone even remotely interested in security for Windows systems, including forensic analysis, should include this book very high on their must-read list."--Harlan Carvey, author of Windows Forensics and Incident Recovery (Addison-Wesley, 2005) Rootkits are the ultimate backdoor, giving hackers ongoing and virtually undetectable access to the systems they exploit. Now, two of the world's leading experts have written the first comprehensive guide to rootkits: what they are, how they work, how to build them, and how to detect them. Rootkit.com's Greg Hoglund and James Butler created and teach Black Hat's legendary course in rootkits. In this book, they reveal never-before-told offensive aspects of rootkit technology--learn how attackers can get in and stay in for years, without detection. Hoglund and Butler show exactly how to subvert the Windows XP and Windows 2000 kernels, teaching concepts that are easily applied to virtually any modern operating system, from Windows Server 2003 to Linux and UNIX. They teach rootkit programming techniques that can be used for a wide range of software, from white hat security tools to operating system drivers and debuggers. After reading this book, readers will be able to Understand the role of rootkits in remote command/control and software eavesdropping Build kernel rootkits that can make processes, files, and directories invisible Master key rootkit programming techniques, including hooking, runtime patching, and directly manipulating kernel objects Work with layered drivers to implement keyboard sniffers and file filters Detect rootkits and build host-based intrusion prevention software that resists rootkit attacks
Version Control By Example
Eric Sink - 2011
Topics covered include:Basic version control commands and conceptsIntroduction to Distributed Version Control Systems (DVCS)Advanced branching workflowsStrengths and weaknesses of DVCS vs. centralized toolsBest practicesHow distributed version control works under the hoodFeaturing these open source version control tools:Apache SubversionMercurialGitVeracity
Common As Muck!: The Autobiography of Roy 'Chubby' Brown
Roy Chubby Brown - 2007
He thought his only career choice would be a life of crime. Fifteen years later, he was one of Britain's most successful comics, playing live to half a million fans a year as Roy 'Chubby' Brown.COMMON AS MUCK! tells an incredible story of hardships, heartbreak and, ultimately, success. From an impoverished childhood with his abusive father, to his brand of comedy too rude for television and his determined fight against throat cancer, COMMON AS MUCK! is a frank telling of a remarkable life, laced with Roy's irrepressible humour.
C: The Complete Reference
Herbert Schildt - 1987
You'll get in-depth coverage of the C language and function libraries as well as all the newest C features, including restricted pointers, inline functions, variable-length arrays, and complex math. This jam-packed resource includes hundreds of examples and sample applications.
Programming Pearls
Jon L. Bentley - 1986
Jon has done a wonderful job of updating the material. I am very impressed at how fresh the new examples seem." - Steve McConnell, author, Code CompleteWhen programmers list their favorite books, Jon Bentley's collection of programming pearls is commonly included among the classics. Just as natural pearls grow from grains of sand that irritate oysters, programming pearls have grown from real problems that have irritated real programmers. With origins beyond solid engineering, in the realm of insight and creativity, Bentley's pearls offer unique and clever solutions to those nagging problems. Illustrated by programs designed as much for fun as for instruction, the book is filled with lucid and witty descriptions of practical programming techniques and fundamental design principles. It is not at all surprising that
Programming Pearls
has been so highly valued by programmers at every level of experience. In this revision, the first in 14 years, Bentley has substantially updated his essays to reflect current programming methods and environments. In addition, there are three new essays on (1) testing, debugging, and timing; (2) set representations; and (3) string problems. All the original programs have been rewritten, and an equal amount of new code has been generated. Implementations of all the programs, in C or C++, are now available on the Web.What remains the same in this new edition is Bentley's focus on the hard core of programming problems and his delivery of workable solutions to those problems. Whether you are new to Bentley's classic or are revisiting his work for some fresh insight, this book is sure to make your own list of favorites.
Managing the Software Process
Watts S. Humphrey - 1989
Emphasis is placed on the basic principles and priorities of the software process. Sections are organized in a natural way for managers and professionals to implement improvement activities.
Business or Pleasure?
Raquel Belle - 2019
I’m about to get really pissed off. Maybe I should just go (in hindsight…even based on what happened next, I’d probably do it all the same!) As is, I hate blind dates! I usually create this “picture perfect” guy in my head and then reality generally walks in! Ohhh god, and reality can be REALLLLLY cruel at times (MOST of the time!!!).Anyway…I’ve just moved back to Seattle to work with my dad at his law firm. We haven’t always had the best relationship…I’m really hoping that this is him reaching out to me. Honestly, blind-dates are the last thing I need right now in my life!I’m about to give up on this night and leave when the most delicious looking specimen of a man comes up to me. I honestly thought I was hallucinating! This guy is ravishing…the type of “stop and stare” guy. Mr. I LITERALLY felt I wanted to get pregnant just by looking at him, says...“Please, tell me I’m the one you’ve been waiting for!” with a naughty smirk on his face.“Are you David Blake?” I ask.“No, but I can be anyone you want me to be.” He smiles, and my head…ohhh god…my head is filled with strong dose of naughty thoughts (a “bit” of an understatement actually!). It’s not my blind-date…and I think to myself (well, I’M TRYING to think!!!) What the hell should I do?I don’t know what the heck happened to me but I stare right into his eyes and say “Tell you what, I’m staying upstairs.” I pause. I could feel his eyes penetrating me. And then I drop the bomb… “Let’s skip the drinks and the preamble, you follow me to my room, and let's have one hell of a one-night stand. You don’t even have to tell me your name.”I couldn’t believe I just said that!He’s shocked. I’m shocked. I don’t normally do this kind of thing. But we do it. Oh, boy…do we do it. We have the most amazing, earth shattering night that I could ever dream of. And THAT was the gift…now comes the SLAP…When the weekend is over and I go in to work on Monday morning. The secretary shows me in to my dad’s office. What the heck is he doing in here? Mr. I LITERALLY felt I wanted to get pregnant just by looking at him turns and smiles.Guess what? My one-night stand is my dad’s billionaire best friend, Jared Hawthorne. He’s my new client. Things are about to get really complicated!Business or Pleasure? is a stand alone romance book with an amazing HEA!
HTML5 and CSS3 (Visual QuickStart Guide)
Elizabeth Castro - 2011
In this completely updated edition of our best-selling guide to HTML, authors Elizabeth Castro and Bruce Hyslop use crystal-clear instructions and friendly prose to introduce you to all of today's HTML5 and CSS essentials. You'll learn how to design, structure, and format your website. You'll learn about the new elements and form input types in HTML5. You'll create and use images, links, styles, lists, tables, frames, and forms; and you'll add video, audio, and other multimedia to your site. You'll learn how to add visual effects with CSS3. You'll understand web standards and learn from code examples that reflect today's best practices. Finally, you will test and debug your site, and publish it to the web. Throughout the book, the authors will cover all of HTML and offer extensive coverage of HTML5 and CSS techniques.
GUI Bloopers: Don'ts and Do's for Software Developers and Web Designers
Jeff Johnson - 2000
While equipping you with the minimum of theory, GUI expert Jeff Johnson presents the reality of interface design in an entertaining, anecdotal, and instructive way. * Updated to reflect the bloopers that are common today, incorporating many comments and suggestions from first edition readers. * Takes a learn-by-example approach that teaches how to avoid common errors. * Covers bloopers in a wide range of categories: GUI controls, graphic design and layout, text messages, interaction strategies, Web site design -- including search, link, and navigation, responsiveness issues, and management decision-making. * Organized and formatted so information needed is quickly found, the new edition features call-outs for the examples and informative captions to enhance quick knowledge building. * Hundreds of illustrations: both the DOs and the DON'Ts for each topic covered, with checklists and additional bloopers on www.gui-bloopers.com.
Refactoring: Improving the Design of Existing Code
Martin Fowler - 1999
Significant numbers of poorly designed programs have been created by less-experienced developers, resulting in applications that are inefficient and hard to maintain and extend. Increasingly, software system professionals are discovering just how difficult it is to work with these inherited, non-optimal applications. For several years, expert-level object programmers have employed a growing collection of techniques to improve the structural integrity and performance of such existing software programs. Referred to as refactoring, these practices have remained in the domain of experts because no attempt has been made to transcribe the lore into a form that all developers could use... until now. In Refactoring: Improving the Design of Existing Software, renowned object technology mentor Martin Fowler breaks new ground, demystifying these master practices and demonstrating how software practitioners can realize the significant benefits of this new process.
The Psychology of Computer Programming
Gerald M. Weinberg - 1971
Weinberg adds new insights and highlights the similarities and differences between now and then. Using a conversational style that invites the reader to join him, Weinberg reunites with some of his most insightful writings on the human side of software engineering.Topics include egoless programming, intelligence, psychological measurement, personality factors, motivation, training, social problems on large projects, problem-solving ability, programming language design, team formation, the programming environment, and much more.Dorset House Publishing is proud to make this important text available to new generations of programmers -- and to encourage readers of the first edition to return to its valuable lessons.
Go To: The Story of the Math Majors, Bridge Players, Engineers, Chess Wizards, Maverick Scientists, and Iconoclasts-- the Programmers Who Created the Software Revolution
Steve Lohr - 2001
Lohr maps out the unique seductions of programming, and gives us an intimate portrait of the peculiar kind of genius that is drawn to this blend of art, science, and engineering, introducing us to the movers and shakers of the 1950s and the open-source movement of today. With original reporting and deft storytelling, Steve Lohr shows us how software transformed the world, and what it holds in store for our future.